Author of the publication

SwiftR: Cross-platform ransomware fingerprinting using hierarchical neural networks on hybrid features.

, , and . Expert Syst. Appl., (September 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SwiftR: Cross-platform ransomware fingerprinting using hierarchical neural networks on hybrid features., , and . Expert Syst. Appl., (September 2023)Intertwined path formation and MAC scheduling for fast delivery of aggregated data in WSN., , , and . Comput. Networks, (2014)A Hybrid Linguistic and Knowledge-Based Analysis Approach for Fake News Detection on Social Media., , , , , and . IEEE Access, (2022)Android Malware Detection using Deep Learning on API Method Sequences., , , and . CoRR, (2017)Cypider: building community-based cyber-defense infrastructure for android malware detection., , , and . ACSAC, page 348-362. ACM, (2016)Low-Cost and Accurate Intra-flow Contention-Based Admission Control for IEEE 802.11 Ad Hoc Networks.. ADHOC-NOW, volume 5198 of Lecture Notes in Computer Science, page 401-412. Springer, (2008)On resilience of Wireless Mesh routing protocol against DoS attacks in IoT-based ambient assisted living applications., , , , , , and . HealthCom, page 205-210. IEEE, (2015)A Self-Stabilizing Leader Election Algorithm in Highly Dynamic Ad Hoc Mobile Networks., and . IEEE Trans. Parallel Distributed Syst., 19 (7): 926-939 (2008)Semi-structured and unstructured data aggregation scheduling in wireless sensor networks., , , , and . INFOCOM, page 2671-2675. IEEE, (2012)Trust models of internet of smart things: A survey, open issues, and future directions., , , and . J. Netw. Comput. Appl., (2019)